General
-
Target
Order_006543.exe
-
Size
670KB
-
Sample
230421-gm2cvsed59
-
MD5
fc8b4a2e2f7b84693d618cb66e07b486
-
SHA1
494f1f0ffc96fa7c62e093791c9caae487254058
-
SHA256
f2880cca891b77df9616dcad027fbba4e2e3425a5c0e3a91ee4a6035572053e2
-
SHA512
e0310dac4512ed920874df283eb38d146933ef8c0e224ab4a6f87f75fa7ad6550a8c0149bc6a4903684e7fdea63e2821cd9f3f3dfe2ea1c9a5b42e8a174af1a3
-
SSDEEP
12288:MTH/lHMH91DzZ7UWg4v8pKjz88P0D0jOZTcK3MsOaoQ0zXi:qH9HMd1Dt7UnXkjdxqZTcKPh0G
Static task
static1
Behavioral task
behavioral1
Sample
Order_006543.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order_006543.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.kumarmulay.com - Port:
25 - Username:
[email protected] - Password:
Akmm@1986!@# - Email To:
[email protected]
Targets
-
-
Target
Order_006543.exe
-
Size
670KB
-
MD5
fc8b4a2e2f7b84693d618cb66e07b486
-
SHA1
494f1f0ffc96fa7c62e093791c9caae487254058
-
SHA256
f2880cca891b77df9616dcad027fbba4e2e3425a5c0e3a91ee4a6035572053e2
-
SHA512
e0310dac4512ed920874df283eb38d146933ef8c0e224ab4a6f87f75fa7ad6550a8c0149bc6a4903684e7fdea63e2821cd9f3f3dfe2ea1c9a5b42e8a174af1a3
-
SSDEEP
12288:MTH/lHMH91DzZ7UWg4v8pKjz88P0D0jOZTcK3MsOaoQ0zXi:qH9HMd1Dt7UnXkjdxqZTcKPh0G
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-